• Title/Summary/Keyword: 통합 메시지

Search Result 316, Processing Time 0.03 seconds

Cooperative Analog and Digital (CANDI) Time Synchronization for Large Multihop Network (다중 홉 네트워크를 위한 디지털 및 아날로그 협동 전송 시간 동기화 프로토콜)

  • Cho, Sung-Hwan;Ingram, Mary Ann
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1084-1093
    • /
    • 2012
  • For large multihop networks, large time synchronization (TS) errors can accumulate with conventional methods, such as TPSN, RBS, and FTSP, since they need a large number of hops to cover the network. In this paper, a method combining Concurrent Cooperative Transmission (CCT) and Semi- Cooperative Spectrum Fusion (SCSF) is proposed to reduce the number of hops to cover the large network. In CCT, cooperating nodes transmit the same digitally encoded message in orthogonal channels simultaneously, so receivers can benefit from array and diversity gains. SCSF is an analog cooperative transmission method where different cooperators transmit correlated information simultaneously. The two methods are combined to create a new distributed method of network TS, called the Cooperative Analog and Digital (CANDI) TS protocol, which promises significantly lower network TS errors in multi-hop networks. CANDI and TPSN are compared in simulation for a line network.

A Design and Implementation of Framework for Interworking between Heterogeneous Vehicle Networks for Intelligent Transportation System (지능형 교통시스템을 위한 이기종 차량 네트워크의 연동 프레임워크 설계 및 구현)

  • Yun, Sang-Du;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.901-908
    • /
    • 2010
  • There are many kinds of networks in vehicle for their purposes. In-vehicle networks, however, are not unified to single network. The networks are composed of several local networks because of communication speed, cost and efficiency. Because the complexity of network design for communication increases, local networks need a framework for interworking between heterogeneous networks. In this paper, a framework interworking between in-vehicle networks for ITS(Intelligent Transportation System) is proposed and implemented. The proposed framework consists of a compatible protocol, message conversion module, message transceiver module and message analysis module. The results obtained by implementation show that the framework efficiently supports the communication of information between heterogeneous in-vehicle networks.

Hibernation Structure Design of Wireless USB over IEEE 802.15.6 Hierarchical MAC Protocol (WUSB over IEEE 802.15.6 통합 MAC 프로토콜의 Hibernation 구조 설계)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1610-1618
    • /
    • 2014
  • Wearable computer systems can use the wireless universal serial bus (WUSB) that refers to USB technology that is merged with WiMedia PHY/MAC technical specifications. In this paper, we focus on an integrated system of the wireless USB over the IEEE 802.15.6 wireless body area networks (WBAN) for wireless wearable computer systems supporting U-health services. And a communication structure that performs the hibernation for low power consumption is proposed for WUSB over IEEE 802.15.6 hierarchical protocol. In the proposed hibernation mechanisms, WUSB communications are permitted at each m-periodic inactive periods of WBAN superframes by using the WBAN information of Wakeup Period and Wakeup Phase message fields. In our performance evaluations, performances according to amount of WUSB traffic and Wakeup Periods are analyzed respectively to evaluate the effectiveness of proposed hibernation structure in WUSB over IEEE 802.15.6.

Design and Implementation of Efficient Dynamic Update and Zone Transfer in the Secure DNS (안전한 DNS에서의 효율적인 동적 갱신과 존 전송 기능의 설계와 구현)

  • Shim, Hee-Won;Shim, Young-Chul;Im, Chan-Soon;Lee, Man-Hee;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.99-114
    • /
    • 2000
  • In the secure DNS the amount of information that should be managed greatly increased and the interdependency in the information became very complex. Therefore, it became necessary to develop a mechanism which can manage zone information efficiently. Moreover, a consistent interface became also necessary so that a secure DNS may be efficiently interconnected with other Internet application services. In this paper we explain the design and implementation of a secure DNS extended with two functions : (1) a dynamic update function which enables to add and remove zone information dynamically and (2) a zone transfer function that efficiently transfers update zone information among DNS servers. We developed a method which integrates two zone transfer mechanisms, full zone transfer and incremental zone transfer, and also proposed a method to compress data in the zone transfer message. We also introduced a data structure called a delta file to integrate the zone transfer function and the dynamic update function.

  • PDF

A Study for Security-Based Medical Information Software Architecture Design Methodology (의료정보보안 기반 소프트웨어 아키텍처 설계방법)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.35-41
    • /
    • 2013
  • What is an alternative to medical information security of medical information more secure preservation and safety of various types of security threats should be taken, starting from the software design. Interspersed with medical information systems medical information to be able to integrate the real-time exchange of medical information must be reliable data communication. The software architecture design of medical information systems and sharing of medical information security issues and communication phase allows the user to identify the requirements reflected in the software design. Software framework design, message standard design, design a web-based inter-process communication procedures, access control algorithm design, architecture, writing descriptions, evaluation of various will procedure the establishing architecture. The initial decision is a software architecture design, development, testing, maintenance, ongoing impact. In addition, the project will be based on the decision in detail. Medical information security method based on the design software architecture of today's medical information security has become an important task of the framework will be able to provide.

Development of AVL-GIS System Using IDGPS and Wireless Communication Techniques (IDGPS 와 무선통신을 이용한 AVL-GIS 시스템개발)

  • 안충현;양종윤;최종현
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.209-221
    • /
    • 1999
  • In this research, AVL-GIS(Automatic Vehicle Location System linked with Geographic Information System) system was developed using integration of core techniques of GIS engine written by Java language, GOS(Global Positioning System) and wireless telecommunication interfacing techniques. IDGPS(Inverted differential GPS) techniques was employed to estimate accurate position of mobile vehicle and to supervise their path from AVL-GLS control center system. Between mobile vehicle and AVL-GLS control center system which has spatial data analysis function, road network and rleate ddata base were connected wireless phone to communicate for position an dmessage in real time. The developed system from this research has more enhanced GIS functions rather than previous AVL oriented system which has MDT for message display and voice communication only. This system can support build-up application system such as fleet management like bus, taxi, truck, disaster and emergency and monitoring of transportation status for customer s order via web browser in filed of EC/CALS in low cost.

  • PDF

Design and Implementation of SNS-linked Location based Mobile AR Systems using OpenAPI on Android (안드로이드 기반 OpenAPI를 이용한 SNS 연동 지역정보 서비스를 위한 모바일 증강현실 시스템 설계 및 구현)

  • Kim, Cheong-Ghil;Chung, Ji-Moon
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.131-140
    • /
    • 2011
  • As the recent advances in network and wireless communications and semiconductor design and process technologies, our computing platform is rapidly shifting from desktop PCs to mobile devices such as UMPC (Ultra Mobile PC), Tablet PC, and Smartphone. Especially, wide-spreading Smartphones allow a new field of application based on location based services available with an user interface called augmented reality (AR). Therefore, this paper introduces an implementation of AR using various OpenAPls on Android Smartphones. In order to utilize enrich user data in real time, the system integrates with location based social network services also with OpenAPI. These APIs enable third-party developers to make use of rich contents of many portal web sites. The prototype was implemented on the real Android phone, Sky Sirius, and the result shows that it can provide an efficient location based service using AR technology without any constraints on mobile devices; in addition, it connects SNS to AR for sharing user data including photos, videos, and messages based on a specific location.

A Location Recognition and Notification Method of Attacker in Wireless Network Environment (모바일 환경에서의 공격자 위치 특정 및 알람 기법)

  • Bong, Jin-Sook;Park, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.201-211
    • /
    • 2017
  • Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.

Implementation of Real-Time Industrial Resources Management System using RFID Technology (RFID 기술을 이용한 실시간 산업자원 관리 시스템 구현)

  • Jeon, Min-Ho;Jeong, Seung-Heui;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.970-972
    • /
    • 2010
  • ERP is an integrated information system to manage all human and material resources in offices. Therefore, the business competitiveness is reinforced. The best requirement of ERP is the real time data collection and analysis in ubiquitous environment. Passive information collection is a problem in existing ERP system. To solve that problem, active system is proposed using RFID Tag and Reader. From the simulation results, we confirm that resource information is acquired and event message is occurred after fixed time. In this paper, the real time management system of industry resource with RFID collects resource information actively instead of passive information collection and supports the event according to the schedule.

  • PDF

XML Signature System on Mobile Environment (모바일 환경에서 XML 전자서명 시스템)

  • Cao, Ke-Rang;Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1441-1447
    • /
    • 2008
  • It is possible to transfer huge data in mobile device by advancing mobile technology, and so in this base, various services are offered. Especially, E-commerce service is offering on mobile environment, and this service is based on XML(eXtensible Markup Language) Signature. XML Signature assure that process integrity, message authentication, and/or signer authentication. And WIPI(Wireless Internet Protocol for Interoperability) that is mobile internet integration platform was proposed to integrate mobile device platform. However, because WIPI transmits and exchanges message by tort of XML base, encryption of XML document and necessity of XML signature are increasing because of weakness of security. Therefor in this paper, Encryption and XML signature module of XML document that satisfy standard requirement in WIPI platform base design and implementation. System that was proposed in this paper used standard encryption and XML signature algorithm and supports safe encryption and XML signature through doing security simulation applied various algorithm for XML document of mobile environment.